|
|
Message-ID: <4CE0BCCC.5020504@redhat.com>
Date: Mon, 15 Nov 2010 12:53:32 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: perf bug
Upstream commit dab5855 ("perf_counter: Add mmap event hooks to
mprotect()") is fundamentally wrong as mprotect_fixup() can free 'vma'
due to merging. Fix the problem by moving perf_event_mmap() hook to
mprotect_fixup(). In certain scenario, a local, unprivileged user could
use this flaw to trigger a denial of service.
Upstream commit:
http://git.kernel.org/linus/63bfd7384b119409685a17d5c58f0b56e5dc03da
https://bugzilla.redhat.com/show_bug.cgi?id=651671
PS: I thought I requested a CVE name for this already, but it turns out
I did not.
Thanks, Eugene
--
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.